A virtual machine must not have access to information of the
CAPEC-115: Authentication Bypass. An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation